?
Solved

Removing Hidden Camera from oleansoft

Posted on 2005-03-06
1
Medium Priority
?
330 Views
Last Modified: 2013-12-04
Recently I installed Hidden Camera employee monitoring software at one of my clients shops, He suspected an employee of using the computer to do some some smallscale porn collecting via the internet :)
Anyway, left this program on for a while. When my client was satisfied with what he saw, I tried to uninstall Hidden Camera of the employees machine. It seems to have worked with no problem untill I noticed that several instances of HCE were still running as processes days later.

How do I completly uninstall this program?

C.
0
Comment
Question by:MCIce_2004
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 12

Accepted Solution

by:
rossfingal earned 500 total points
ID: 13475242
Hi!

See if anything related to it is running as a service -
Click on "Start" - click on "Run" then type "services.msc" (without quotes)
In the list of services, if you find any related to it, note where they are running from -
Then: Stop them - then Disable them.
Try removing them now.
You may have to do this in "Safe" mode.

Good luck!

RF
0

Featured Post

New benefit for Premium Members - Upgrade now!

Ready to get started with anonymous questions today? It's easy! Learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
Security measures require Windows be logged in using Standard User login (not Administrator).  Yet, sometimes an application has to be run “As Administrator” from a Standard User login.  This paper describes how to create a shortcut icon to launch a…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Have you created a query with information for a calendar? ... and then, abra-cadabra, the calendar is done?! I am going to show you how to make that happen. Visualize your data!  ... really see it To use the code to create a calendar from a q…
Suggested Courses
Course of the Month11 days, 1 hour left to enroll

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question